WO2023221917A1 - Procédé de protection de compte, système de communication et dispositif électronique - Google Patents

Procédé de protection de compte, système de communication et dispositif électronique Download PDF

Info

Publication number
WO2023221917A1
WO2023221917A1 PCT/CN2023/094171 CN2023094171W WO2023221917A1 WO 2023221917 A1 WO2023221917 A1 WO 2023221917A1 CN 2023094171 W CN2023094171 W CN 2023094171W WO 2023221917 A1 WO2023221917 A1 WO 2023221917A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication
server
message
electronic device
account
Prior art date
Application number
PCT/CN2023/094171
Other languages
English (en)
Chinese (zh)
Inventor
孟繁瑞
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023221917A1 publication Critical patent/WO2023221917A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Definitions

  • This application relates to the field of electronic technology, and in particular to account shielding methods, communication systems and electronic devices.
  • a mobile phone can receive cellular calls and/or cellular text messages from other users; at the same time, as a smart device, a mobile phone can also run You can also receive audio and video calls and messages from other users through instant messaging applications (such as messages), Internet calls and/or Internet SMS.
  • instant messaging applications such as messages
  • users' electronic devices may receive cellular calls and/or cellular text messages from unwanted persons. After receiving the user's blocking operation of a cellular number (phone number), the electronic device can intercept incoming calls from the cellular number, and move the text messages sent by the cellular number into the trash without reminding the user, but the undesirable person can still Make online calls and/or send online text messages to users through the account of the instant messaging application.
  • a cellular number phone number
  • the electronic device can intercept incoming calls from the cellular number, and move the text messages sent by the cellular number into the trash without reminding the user, but the undesirable person can still Make online calls and/or send online text messages to users through the account of the instant messaging application.
  • the embodiments of this application provide an account shielding method, a communication system and an electronic device.
  • the account blocking method provided by this application can obtain multiple other communication identifications by correlating the communication identifications that the user has added to the blocking list; and when the communication identifications added to the blocking list are associated with other communication identifications, the newly added communication identifications The identifier will also be added to the block list, so that the server or electronic device can intercept the communication corresponding to the block list.
  • the account blocking method provided by this application can determine more communication identifiers of undesirable persons, thereby preventing users from being disturbed by unwelcome persons.
  • embodiments of the present application provide an account shielding method, applied to a system including a first server and a first electronic device.
  • the method includes: after the first server receives the first message, the first server based on The first message associates a first communication identifier with a second communication identifier, and the first communication identifier is the communication identifier of the first user, wherein the second communication identifier does not exist before the first server receives the first message.
  • the first server determines When the first communication identification belongs to the first blocking list, the first server adds the second communication identification to the first blocking list, and the first blocking list is the blocking list of the second user; the first electronic device intercepts the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or the first server intercepts the first communication, and the first communication
  • the communication identifier of the initiator is in the first blocking list
  • the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • the account blocking method provided by the embodiment of the present application can determine one or more newly added communication identifiers associated with the blocked list, and add these newly added one or more communication identifiers to the blocked list. , thereby preventing users from being disturbed by unwelcome persons.
  • the first communication identification is equivalent to communication identification 3001
  • the second communication identification is equivalent to communication identification 3003.
  • the method further includes: after the first server receives the second message, the first server communicates the first communication identifier with a third communication based on the second message. Identity association, the second message is sent by the application server corresponding to the instant messaging application, and the second message is used to indicate that the third communication identification is associated with the first communication identification, wherein the application server is associated with the third communication identification. Before the communication identification and the first communication identification, the third communication identification does not exist or the third communication identification is not associated with the first communication identification; the first server adds the third communication identification to the first blocking list.
  • the newly added communication identifier can also come from the application server. After the application server determines the association, it can send the newly added communication identifier to the first server, so that the server can update the blocking list and obtain as complete a list as possible. Blocklist, thus preventing users from being disturbed by unwanted people.
  • the third communication identification is equivalent to communication identification 3003.
  • the method before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, and the third message is received by the first server.
  • the third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list.
  • the fourth communication identifier is added to the first blocking list.
  • the server can determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the blocked list, thereby preventing the user from being unwelcome. or disturb.
  • the fourth communication identifier is communication identifier 3002.
  • the first message is used to instruct the first server to register the second communication identity based on the first communication identity.
  • the newly registered account when an undesirable person registers a new account, the newly registered account will also be added to the first blocking list, thereby preventing the user from being disturbed by the undesirable person.
  • the method before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account.
  • the first account is the first communication identifier; the first message is used to register the second account based on the first cellular number.
  • the account blocking method provided by the embodiment of the present application can add the newly registered second account to the blocking list, thereby making Users are not disturbed by undesirables.
  • the first communication identifier is a first cellular number
  • the first message is used to instruct the first server to bind the first cellular number and the first account
  • the The second communication identification is the first account.
  • the other identifications will also be added to the blocking list, thereby preventing the user from being disturbed by the unwanted persons.
  • the first communication identifier is a first cellular number
  • the second message is used to inform the first server that the cellular number of the first user also includes a second cellular number.
  • the first message is sent after the first user's electronic device detects the newly inserted SIM card.
  • the system further includes a second server
  • the method further includes: the first server sending a fourth message to the second server, the fourth message including a fifth communication
  • the fifth communication identifier is a communication identifier in the first blocking list; after the second server determines the sixth communication identifier associated with the fifth communication identifier, the second server sends a fifth message to the first server , after the fifth message includes the sixth communication identifier, The first server adds the fifth communication identifier to the first blocking list.
  • multiple servers can also be used to determine the communication identification of the undesirable person as complete as possible, so that the user is not disturbed by the undesirable person.
  • embodiments of the present application provide an account shielding method, applied to a first server.
  • the method includes: after the first server receives the first message, the first server sends the first communication to the first server based on the first message.
  • the identification is associated with a second communication identification, and the first communication identification is the communication identification of the first user.
  • the second communication identification does not exist or the second communication identification is different from the first communication identification.
  • the first communication identifier is not associated, the first message is sent by the first user's electronic device, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines that the first communication identifier belongs to the first user.
  • the first server When blocking the list, the first server adds the second communication identifier to the first blocking list, and the first blocking list is the blocking list of the second user; the first server intercepts the first communication, and the initiator of the first communication The communication identifier of is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • the account blocking method provided by the embodiment of the present application can determine one or more newly added communication identifiers associated with the blocked list, and add these newly added one or more communication identifiers to the blocked list. , thereby preventing users from being disturbed by unwelcome persons.
  • the first communication identification is equivalent to communication identification 3001
  • the second communication identification is equivalent to communication identification 3003.
  • the first server associates the first communication identification with the third communication identification based on the second message, and the first communication identification is The second message is sent by the application server corresponding to the instant messaging application.
  • the second message is used to indicate that the third communication identifier is associated with the first communication identifier, wherein the third communication identifier is associated with the first communication identifier in the application server.
  • the third communication identifier does not exist or the third communication identifier is not associated with the first communication identifier; the first server adds the third communication identifier to the first blocking list.
  • the newly added communication identifier can also come from the application server. After the application server determines the association, it can send the newly added communication identifier to the first server, so that the server can update the blocking list and obtain as complete a list as possible. Blocklist, thus preventing users from being disturbed by unwanted people.
  • the third communication identification is equivalent to communication identification 3003.
  • the method before the first server receives the first message, the method further includes: the first server receives a third message sent by the first electronic device, and the first The third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list.
  • the fourth communication identifier is added to the first blocking list.
  • the server can determine the second communication identifier associated with the first communication identifier, and add the fourth communication identifier to the blocked list, thereby preventing the user from being unwelcome. or disturb.
  • the fourth communication identifier is communication identifier 3002.
  • the first message is used to instruct the first server to register the second communication identification based on the first communication identification.
  • the newly registered account when an undesirable person registers a new account, the newly registered account will also be added to the first blocking list, thereby preventing the user from being disturbed by the undesirable person.
  • the method before the first server receives the first message, the method further includes: the first server receives a logout request, and the first server logs out the first account.
  • the first account is the first communication identifier; the first message is used to register the second account based on the first cellular number, the first cellular number is the fourth communication identifier, and the second account is the second communication identifier logo.
  • the first communication identifier is a first cellular number
  • the first message is used to instruct the first server to bind the first cellular number and the first account
  • the The second communication identification is the first account.
  • the other identifications will also be added to the blocking list, thereby preventing the user from being disturbed by the unwanted persons.
  • the first communication identifier is a first cellular number
  • the second message is used to inform the first server that the cellular number of the first user also includes a second cellular number.
  • the first message is sent after the first user's electronic device detects the newly inserted SIM card.
  • embodiments of the present application provide an account shielding method, applied to a system including a first server and a first electronic device.
  • the method includes: the first electronic device sending a first message to the first server, the The first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines the first cellular number associated with the first communication identifier; the first server sends a message to the first electronic device Send the first cellular number; the first electronic device intercepts the first communication, and the first communication is a cellular call or cellular text message corresponding to the first cellular number.
  • the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons.
  • the first communication identifier is communication identifier 3001
  • the first cell number is communication identifier 3002 and communication identifier 3003.
  • the method further includes: the first server receives a second message, and the first server based on the second message The message determines that the second communication identifier is associated with the first cellular number, and the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to instruct the first server to register the first account based on the first cellular number. Bind the first cellular number to the first account; the first server intercepts the second communication, the second communication is an audio and video call, Internet phone call, Internet text message, or Internet call initiated by the first account to the first user's account. information.
  • the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
  • the first server receives a second message, the first server determines that the second communication identifier is associated with the first cellular number based on the second message, and the second message is used Instructing the first server to register the first account based on the first cellular number, or the second message is used to instruct the first server to bind the first cellular number and the first account; the first server sends a message to the first server.
  • the first electronic device sends a third message, the third message includes the first account; the first electronic device intercepts the second communication, the second communication is an audio and video call, Internet phone call, Internet text message or message initiated by the first account .
  • the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
  • embodiments of the present application provide an account shielding method, applied to a first server.
  • the method includes: the first server receives a first message sent by a first electronic device, where the first message includes a first communication identifier.
  • communication identification is a cellular number or an account of an instant messaging application; the first server determines the first cellular number associated with the first communication identification; the first server sends a second message to the first electronic device, the second message includes the The first cellular number, the cellular call or cellular text message corresponding to the first cellular number is intercepted by the first electronic device.
  • the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons.
  • the first communication identifier is communication identifier 3001
  • the first cell number is communication identifier 3002 and communication identifier 3003.
  • the method further includes: the first server receives the second message, and the first server It is determined based on the second message that the second communication identifier is associated with the first cellular number, the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to indicate
  • the first server binds the first cellular number to the first account; the first server intercepts the second communication, which is an audio and video call or Internet call initiated by the first account to the first user's account. , online text messages or messages.
  • the account blocking method provided by the embodiment of the present application can determine whether the newly added communication identifiers are associated with the blocked list, and if so, add these newly added communication identifiers to the blocked list, so that the user is not excluded. Welcome interrupt.
  • embodiments of the present application provide an account blocking method, applied to a first electronic device.
  • the method includes: after the first electronic device determines that the first communication identifier is in the first blocking list, the first electronic device Determine a second communication identification associated with the first communication identification, where, when the first communication identification is a first cellular number, the second communication identification is a second cellular number; when the first communication identification is a first cellular number, In the case of an account, the second communication identifier is the first cellular number, and the communication identifier is the cellular number or the account number of the instant messaging application; the second communication identifier is added to the first blocking list on the first electronic device; The first electronic device intercepts the first communication, and the identifier of the initiator of the first communication is the communication identifier in the first blocking list.
  • the account blocking method provided by the embodiment of the present application can determine the cellular numbers associated with the blocking list and add these cellular numbers to the blocking list, thereby preventing users from being disturbed by unwanted persons.
  • the first communication identifier is communication identifier 3001
  • the second communication identifier is communication identifier 3002 or communication identifier 3003.
  • the first electronic device determines a second communication identifier associated with the first communication identifier, specifically including: a system application sending a first communication identifier to one or more instant messaging applications.
  • a message, the first message includes the first communication identifier, and the one or more instant messaging applications include a first application program; the first application program determines that the second communication identifier is associated with the first communication identifier; the first communication identifier is An application program sends a second message to the system application, where the second message includes the second communication identifier.
  • the system application determines that the second communication identifier is associated with the first communication identifier.
  • the system application can obtain other communication identifiers associated with the first communication identifier by querying other third-party applications, and then add the other communication identifiers to the blocking list.
  • embodiments of the present application provide an account shielding method, applied to a system including a first electronic device, a second electronic device, and a first server.
  • the method includes: the first electronic device sends an account to the first server.
  • the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
  • the first server determines the second electronic device based on the first communication identifier, and the first communication identifier is The communication identification of the user on the second electronic device;
  • the first server sends the second communication identification to the second electronic device, and the second communication identification is the communication identification of the user on the first electronic device;
  • the second electronic device receives After receiving the second communication identifier, the first communication is intercepted, and the third communication is intercepted.
  • the identity of the recipient of a communication is the second communication identity.
  • the server after the server determines that the first electronic device adds the first communication identifier to the blocking list, the server notifies the second electronic device, so that the second electronic device intercepts the user-initiated communication on the second electronic device to the first electronic device.
  • the first communication identifier is communication identifier 3001
  • the second communication identifier is communication identifier 3002 or communication identifier 3003.
  • embodiments of the present application provide an account shielding method, applied to a first server.
  • the method includes: the first server receives a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number. or the account of the instant messaging application; the first server determines the second electronic device based on the first communication identification, and the first communication identification is the communication identification of the user on the second electronic device; the first server sends a message to the second electronic device.
  • the device sends a second message, the second message includes the second communication identifier, the second communication identifier is the communication identifier of the user on the first electronic device, and the second message is used to instruct the second electronic device to intercept the first communication,
  • the communication identification of the recipient of the first communication is the second communication identification.
  • the server after the server determines that the first electronic device adds the first communication identifier to the blocking list, the server notifies the second electronic device, so that the second electronic device intercepts the user-initiated communication on the second electronic device to the first electronic device. User communications.
  • embodiments of the present application provide an account shielding method, applied to a second electronic device.
  • the method includes: receiving a first message, the first message including a first communication identifier, and the communication identifier is a cellular number or instant messaging.
  • the account of the application program intercept the first communication, and the communication identifier of the recipient of the first communication is the first communication identifier.
  • the second electronic device after the second electronic device receives the first message and determines that the user on the second electronic device has been added to the blocked list by the user on the other electronic device, the second electronic device will intercept the communication to the user on the other electronic device. .
  • embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, the memory is used to store computer program codes, and the computer
  • the program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: after the first server receives the first message, the first server combines the first communication identification with the first message based on the first message.
  • a second communication identification is associated, and the first communication identification is the communication identification of the first user. Before the first server receives the first message, the second communication identification does not exist or the second communication identification is not related to the third communication identification.
  • a communication identifier is not associated, the first message is sent by the electronic device of the first user, and the communication identifier is a cellular number or an account of an instant messaging application; the first server determines that the first communication identifier belongs to the first blocking list When, the first server adds the second communication identifier to the first blocking list, and the first blocking list is the blocking list of the second user; the first server intercepts the first communication, and the communication of the initiator of the first communication The identifier is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: after the first server receives the second message, the third A server associates the first communication identifier with the third communication identifier based on the second message.
  • the second message is sent by the application server corresponding to the instant messaging application.
  • the second message is used to indicate that the third communication identifier is associated with the third communication identifier.
  • the first communication identification is associated, wherein before the application server associates the third communication identification with the first communication identification, the third communication identification does not exist or the third communication identification is not associated with the first communication identification; the third communication identification is not associated with the first communication identification;
  • a server adds the third communication identifier to the first blocking list.
  • the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: the first server receives the first electronic device sent by the first electronic device. Three messages, the first The third message includes the first communication identifier; the first server adds the first communication identifier to the first shielding list; the first server determines a fourth communication identifier associated with the first communication identifier; the first server adds the first communication identifier to the first shielding list. The fourth communication identifier is added to the first blocking list.
  • the first message is used to instruct the first server to register the second communication identity based on the first communication identity.
  • the one or more processors are also used to call the computer instructions to cause the electronic device to execute: the first server receives a logout request, and the first server logs out The first account is the first communication identifier; the first message is used to register the second account based on the first cellular number, the first cellular number is the fourth communication identifier, and the second account is Second communication identifier.
  • the first communication identifier is a first cellular number
  • the first message is used to instruct the first server to bind the first cellular number and the first account
  • the The second communication identification is the first account.
  • the first communication identifier is a first cellular number
  • the second message is used to inform the first server that the first user's cellular number also includes a second cellular number.
  • the first message is sent after the first user's electronic device detects the newly inserted SIM card.
  • embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, the memory is used to store computer program codes, and the computer
  • the program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: the first server receives a first message sent by the first electronic device, the first message includes a first communication identifier, and the communication
  • the identification is a cellular number or an account of an instant messaging application;
  • the first server determines the first cellular number associated with the first communication identification;
  • the first server sends a second message to the first electronic device, the second message includes The first cellular number, the cellular call or the cellular text message corresponding to the first cellular number are intercepted by the first electronic device.
  • the one or more processors are also configured to call the computer instructions to cause the electronic device to execute: the first server receives the second message, the first server It is determined based on the second message that the second communication identifier is associated with the first cellular number, the second message is used to instruct the first server to register the first account based on the first cellular number, or the second message is used to indicate The first server binds the first cellular number to the first account; the first server intercepts the second communication, which is an audio and video call or Internet call initiated by the first account to the first user's account. , online text messages or messages.
  • embodiments of the present application provide an electronic device.
  • the electronic device includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes.
  • the computer program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to execute: after the first electronic device determines that the first communication identifier is in the first blocking list, the first electronic device Determine a second communication identification associated with the first communication identification, where, when the first communication identification is a first cellular number, the second communication identification is a second cellular number; when the first communication identification is a first cellular number, In the case of an account, the second communication identifier is the first cellular number, and the communication identifier is the cellular number or the account number of the instant messaging application; the second communication identifier is added to the first blocking list on the first electronic device; The first electronic device intercepts the first communication, and the identifier of the initiator of the first communication is the communication identifier in the first blocking
  • the one or more processors are specifically configured to invoke the computer instructions to cause the electronic device to execute: a system application sends a message to one or more instant messaging applications first match information, the first message includes the first communication identifier, and the one or more instant messaging applications include a first application; the first application determines that the second communication identifier is associated with the first communication identifier; the first The application program sends a second message to the system application, where the second message includes the second communication identifier and the system application determines that the second communication identifier is associated with the first communication identifier.
  • embodiments of the present application provide a server, which includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes, the The computer program code includes computer instructions that are invoked by the one or more processors to cause the electronic device to execute: the first server receives a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number or The account of the instant messaging application; the first server determines the second electronic device based on the first communication identification, and the first communication identification is the communication identification of the user on the second electronic device; the first server sends a message to the second electronic device Send a second message, the second message includes the second communication identifier, the second communication identifier is the communication identifier of the user on the first electronic device, the second message is used to instruct the second electronic device to intercept the first communication, the The communication identification of the recipient of the first communication is the second communication identification.
  • embodiments of the present application provide an electronic device.
  • the electronic device includes: one or more processors and a memory; the memory is coupled to the one or more processors, and the memory is used to store computer program codes.
  • the computer program code includes computer instructions, and the one or more processors call the computer instructions to cause the electronic device to perform: receiving a first message, the first message includes a first communication identifier, and the communication identifier is a cellular number or instant messaging
  • the account of the application program intercept the first communication, and the communication identifier of the recipient of the first communication is the first communication identifier.
  • inventions of the present application provide a communication system.
  • the communication system includes: the communication system includes a first electronic device and a first server, wherein the first server is configured to receive the first message based on The first message associates a first communication identifier with a second communication identifier, and the first communication identifier is the communication identifier of the first user, wherein the second communication identifier does not exist before the first server receives the first message.
  • the first server is configured to add the second communication identification to the first blocking list when determining that the first communication identification belongs to the first blocking list.
  • the first blocking list is the blocking list of the second user.
  • the first electronic device is used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the first electronic device is the electronic device of the second user; or, the first server Used to intercept the first communication, the communication identifier of the initiator of the first communication is in the first blocking list, and the communication identifier of the recipient of the first communication is the communication identifier of the second user.
  • inventions of the present application provide a communication system.
  • the communication system includes a first electronic device and a first server, wherein the first electronic device is used to send a first message to the first server, and the first electronic device is configured to send a first message to the first server.
  • a message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application; the first server is used to determine the first cellular number associated with the first communication identifier; the first server is used to send a message to the third communication identifier.
  • An electronic device sends a first cellular number; the first electronic device is used to intercept a first communication, and the first communication is a cellular call or cellular text message corresponding to the first cellular number.
  • embodiments of the present application provide a communication system, which includes a first electronic device, a second An electronic device and a first server, wherein the first electronic device is used to send a first message to the first server, the first message includes a first communication identifier, and the communication identifier is a cellular number or an account of an instant messaging application;
  • the first server is configured to determine the second electronic device based on the first communication identification, which is the communication identification of the user on the second electronic device; the first server is configured to send the second communication to the second electronic device
  • the second communication identification is the communication identification of the user on the first electronic device; the second electronic device is configured to intercept the first communication after receiving the second communication identification, and the identification of the recipient of the first communication is the second communication identifier.
  • embodiments of the present application provide a chip system, which is applied to electronic equipment or servers.
  • the chip system includes one or more processors, and the processor is used to call computer instructions to cause the electronic equipment to execute
  • the processor is used to call computer instructions to cause the electronic equipment to execute
  • embodiments of the present application provide a computer program product containing instructions.
  • the electronic device causes the electronic device to execute the ninth aspect, the tenth aspect, the eleventh aspect, The method described in the twelfth aspect and any possible implementation manner in the ninth aspect, the tenth aspect, the eleventh aspect and the twelfth aspect.
  • embodiments of the present application provide a computer-readable storage medium, including instructions.
  • the electronic device When the instructions are run on an electronic device, the electronic device causes the electronic device to execute the ninth aspect, the tenth aspect, the eleventh aspect, and the first aspect.
  • the electronic devices or servers provided by the above-mentioned ninth, tenth, eleventh, twelfth and thirteenth aspects, the electronic devices or servers provided by the fourteenth, fifteenth and sixteenth aspects are all used to execute the method provided by the embodiment of the present application. Therefore, the beneficial effects it can achieve can be referred to the beneficial effects in the corresponding methods, and will not be described again here.
  • Figure 1 is an exemplary schematic diagram of applicable scenarios for the account shielding method provided by the embodiment of the present application.
  • Figure 2 is an exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 3 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • FIG. 4A is an exemplary schematic diagram of determining one or more second communication identifiers provided by an embodiment of the present application.
  • FIG. 4B is an exemplary schematic diagram of the first server determining one or more second communication identifiers provided by the embodiment of the present application.
  • FIG. 4C is an exemplary schematic diagram of a first electronic device determining one or more second communication identifiers according to an embodiment of the present application.
  • Figure 4D is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 5 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 6 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Figure 7 is an exemplary schematic diagram of intercepting communications in the account shielding method provided by the embodiment of the present application.
  • Figure 8 is an exemplary schematic diagram of a communication system provided by an embodiment of the present application.
  • FIG. 9 is an exemplary schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • FIG. 10 is an exemplary schematic diagram of the software architecture of the electronic device provided by the embodiment of the present application.
  • FIG. 11A is an exemplary schematic diagram of data flow during the process of adding a communication identifier to a blacklist database by a first electronic device according to an embodiment of the present application.
  • FIG. 11B is an exemplary schematic diagram of an instant messaging application intercepting audio and video calls or messages according to an embodiment of the present application.
  • Figure 11C is another exemplary schematic diagram of the instant messaging application intercepting Internet calls or Internet text messages provided by the embodiment of the present application.
  • first and second are used for descriptive purposes only and shall not be understood as implying or implying relative importance or implicitly specifying the quantity of indicated technical features. Therefore, the features defined as “first” and “second” may explicitly or implicitly include one or more of the features. In the description of the embodiments of this application, unless otherwise specified, “plurality” The meaning is two or more.
  • GUI graphical user interface
  • Figure 1 is an exemplary schematic diagram of applicable scenarios for the account shielding method provided by the embodiment of the present application.
  • user 1 makes a cellular call to mobile phone 2 through mobile phone 1.
  • user 2 can determine that user 1 is an undesirable person, and then user 2 can block the cellular number corresponding to user 1, as shown in stage 2.
  • the interface displayed by mobile phone 2 may be as shown in interface 101.
  • the content displayed on the interface 101 includes the cellular number of user 1 and the control 102 .
  • the cellular number of user 1 is 123456789.
  • the mobile phone 2 can promptly hang up the incoming call from the cellular number, and/or do not display the interface for the incoming call.
  • Mobile phone 2 can also move the text messages of this cellular number to the trash.
  • user 1 can access the Wait for the instant messaging software to send an Internet text message to mobile phone 2 or initiate an Internet call.
  • user 1 can also use mobile phone 1 to to user 2 account (or account) to send messages or initiate audio and video calls; or, in the corresponding account of user 1
  • the account corresponds to user 2
  • User 1 can use the friend adding function to add the corresponding account to User 2.
  • the account sends friend adding messages.
  • the unwanted person when the unwanted person holds more than one SIM card, that is, multiple cellular numbers, the unwanted person can only block the unwanted person's cellular numbers one by one after being disturbed.
  • user 2 needs to manually perform many operations, resulting in poor user experience.
  • embodiments of the present application provide account shielding methods, systems and electronic devices.
  • the account blocking method provided by this application can automatically query the undesirable person by the first user's electronic device or server after the first user (for example, user 2 in Figure 1) blocks the communication identification of any undesirable person. All communication identifiers of the unwanted person, and after querying all the identifiers of the unwanted person, intercept the communication initiated by the unwanted person on the terminal side or the server side, such as cellular phone calls, cellular text messages, Internet calls, Internet SMS, emails, messages and/or audio and video calls.
  • the communication identifier may be a cellular number, an account of an instant messaging application (where the account of an instant messaging application may be an account of an undesirable person, or a network number displayed on the first electronic device
  • the account of an instant messaging application may be an account of an undesirable person, or a network number displayed on the first electronic device
  • the network number displayed on the unwanted person’s electronic device is YYYYY, then YYYYY can also be used as an instant messaging application account
  • Interception on the terminal side may include intercepting communications initiated by the undesirable person's electronic device on the electronic device side of the undesirable person, or intercepting communications initiated by the unwelcome person on the electronic device side of the first user.
  • the server detects the operation of the undesirable person's new communication identifier
  • the new communication identifier can be added in a timely manner.
  • the identifier is added to the first user's blacklist.
  • the undesirable person's operation of adding a new communication identification may include the undesirable person using the blocked cellular number to register a new instant messaging application account, and the new communication identification is the newly registered instant messaging application. account; or, the undesirable person cancels the account of the instant messaging application and then re-registers an account of a new instant messaging application, and the new communication ID is the account of the re-registered instant messaging application; or, the undesirable person Use the cellular number corresponding to the secondary card to register an account for the instant messaging application.
  • the account for the registered instant messaging application is the new communication ID, etc.
  • the cellular number may also include a virtual number, where the virtual number is a number in a Virtual Private Mobile Network (Virtual Private Mobile Network, VPMN).
  • VPMN Virtual Private Mobile Network
  • Figure 2 is an exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • Phase 1 and Phase 2 in Figure 2 the content shown in Phase 1 and Phase 2 in Figure 2 is the same as that shown in Phase 1 and Phase 2 in Figure 1. You can refer to the corresponding text description in Figure 1 and will not be described again here.
  • the first server and/or mobile phone 2 associate the communication identification of user 1 to discover other communication identifications of user 1.
  • the server associates the communication identifier of the cellular number "123456789" and determines that the result of the association is: instant messaging application account (such as Account) is Ab123456789, The email account is: 123456789@huawei.com, other cellular numbers: 987654321, The email account is: 987654321@huawei.com.
  • the first server can synchronize some or all of user 1's communication identifiers to mobile phone 2.
  • the first server and/or mobile phone 2 can intercept communications initiated by user 1, such as Internet calls, Internet text messages, emails, messages and/or audio and video calls.
  • the first server can intercept audio and video calls initiated by user 1 through an instant messaging application, messages sent; for another example, mobile phone 2 can intercept incoming calls and text messages from cellular numbers 123456789 and cellular number 987654321; for another example, mobile phone 2 or the server can intercept emails sent by 123456789@huawei.com and 987654321@huawei.com.
  • the first server or mobile phone 2 can update user 1's new communication identification, and then intercept user 1's communication through mobile phone 1 or other Communication initiated by the electronic device to mobile phone 2; or, after detecting user 1's new communication identification operation, the first server or mobile phone 1 can update the new communication identification of the undesirable person and transfer the new communication identification of user 2 to The communication identifier is updated to mobile phone 2 so that mobile phone 2 can intercept communications initiated by user 1 through mobile phone 1 or other electronic devices.
  • the first server in response to user 2 blocking any communication identification of user 1, can associate the communication identification to obtain all communication identifications of the undesirable person, and then use mobile phone 2 and/or the third server to block the communication identification of user 1.
  • One server blocks all communication identifiers of the undesirable person, protecting user 2 from being disturbed by user 1, without requiring user 2 to perform cumbersome operations, and improving the user experience.
  • Figure 3 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • the first electronic device determines that the communication identifier 3001 is added to the blacklist.
  • the first electronic device determines that the communication identifier 3001 is added to the blacklist (which may also be called a shielded list); or, the first electronic device may obtain the information from other servers including the first server or the first
  • the instant messaging application on the electronic device obtains communication identifiers 3001 marked as promotional or advertising types by other users, and then adds the communication identifiers 3001 to the blacklist.
  • the communication identifier 3001 may be a cellular number, an account of an instant messaging application, or an email address.
  • blacklist synchronization can be performed between multiple electronic devices logged in with the same user account.
  • the synchronization of the blacklist may be performed by the first server or other servers.
  • the first electronic device determines the communication identifier 3001
  • the communication identifier 3001 is a cellular number
  • it is added to the blacklist
  • the communication identifier 3001 is an account or cellular number of an instant messaging application
  • the first electronic device sends the communication identification 3001 to the first server, and the server adds the communication identification 3001 to the blacklist.
  • the communication identifier 3001 can be added to the blacklist.
  • the addition and deletion of communication identifiers in the blacklist are only performed by the first server, and the first electronic device is synchronized to the blacklist by the first server.
  • the addition and deletion of communication identifiers in the blacklist are performed by the first server and/or the first electronic device.
  • S302 The first electronic device sends message 1 to the first server, where message 1 includes communication identification 3001.
  • the first server is system and The server corresponding to the system, for example server.
  • the first server is an application server corresponding to the instant messaging application.
  • the first server is an operator server.
  • the first server after receiving message 1, the first server adds the communication identifier 3001 to the blacklist.
  • the first server determines one or more communication identifiers 3002 associated with the communication identifier 3001.
  • the first server may use multiple methods to determine one or more communication identifiers 3002 associated with the communication identifier 3001, which are not limited here.
  • the following is an exemplary introduction to several methods by which the first server determines one or more communication identifiers 3002.
  • the first server when the first server is a server corresponding to the operating system, a set of communication identifiers of different users is stored on the first server; when the first server determines that the communication identifier 3001 belongs to the If the set of communication identifications of welcome persons is set, each communication identification in the set of communication identifications of unwelcome persons may be used as one or more associated communication identifications 3002. Wherein, the first server may periodically obtain communication identification sets of different users.
  • the first server when the first server is a server corresponding to the operating system, the first server may also request the communication identification 3002 associated with the communication identification 3001 from the application server corresponding to the instant messaging application.
  • the server can server or The server sends request 1, which carries communication identifier 3001.
  • Request 1 is a request for obtaining other communication identifiers associated with communication identifier 3001.
  • the first server can determine the second electronic device based on the communication identification 3001, and then, the first server sends the information to the third electronic device.
  • the second electronic device queries other communication identifiers on the second electronic device; and then, after receiving the communication identifier sent by the second electronic device, the first server can determine one or more communication identifiers 3002.
  • other communication identifiers on the second electronic device may not have a direct correlation with the communication identifier 3001, for example, on the second electronic device
  • the account logged in by the application is not bound to the communication ID 3001.
  • the second electronic device The account logged in by the application program is obtained by the first server instructing the system application on the second electronic device to execute a query.
  • the server may be an operator server, such as server or server.
  • the operator server can distinguish different electronic devices through parameters such as international mobile equipment identity (IMEI) and international mobile subscriber identification number (IMSI), and then determine an electronic device. or multiple cellular numbers, and then the communication identification 3002 can be determined.
  • the operator server may determine the second user based on the communication identifier 3001, and further determine other cellular numbers of the second user based on the second user.
  • the first electronic device and the operator server can establish a connection and exchange information, or the first electronic device can exchange information with the operator server through a server corresponding to the operating system.
  • the method for determining one or more communication identifiers 3002 is exemplarily introduced above.
  • the first server will perform more than one association to obtain one or more communication identifiers 3002 that are as complete as possible.
  • the first server sends message 2 to the first electronic device, where message 2 includes part or all of one or more communication identifiers 3002.
  • the first server after the first server determines one or more communication identifiers 3002 associated with the communication identifier 3001, the first server sends one or more communication identifiers 3002 to the first electronic device.
  • the first server may not send message 2 to the first electronic device.
  • the message 2 sent by the first server to the first electronic device includes the cellular number in the one or more communication identifiers 3002.
  • the first electronic device may also send the first user's identification, such as the first user's communication identification, the user's ID, the first electronic device's identification, to the first server. logged in account or or other parameters used to distinguish different users.
  • the first server is an application server corresponding to the instant messaging application
  • the identity of the first user may also be the account of the first user's instant messaging application.
  • the first server may create a blacklist for the first user, and add the account of the instant messaging application in the one or more communication identifiers 3002 to the first user's blacklist.
  • the first server determines that an undesirable person initiates an Internet phone call, Internet text message, email, message and/or audio and video call to the first user, it can directly intercept the call.
  • the first server can synchronize the cellular numbers in one or more communication identifiers 3002 with the operator server.
  • the operator server may intercept the cellular number in one or more communication identifiers 3002 to initiate a cellular call and/or cellular text message to the cellular number on the first electronic device.
  • the first electronic device updates the blacklist based on part or all of one or more communication identifiers 3002.
  • the first electronic device may update the blacklist.
  • the first electronic device may intercept cellular calls, cellular text messages, audio and video calls, messages, Internet calls and/or Internet text messages based on the blacklist.
  • a system application on the first electronic device can obtain the cellular number in one or more communication identifiers 3002 and add the cellular number to the blacklist.
  • the system manager determines whether the number of the incoming call or text message is in the blacklist. If the number of the incoming call or text message is in the blacklist, the system manager can intercept the incoming call or text message.
  • the system application on the first electronic device may add the cellular numbers in the one or more communication identifiers 3002 to
  • the instant messaging application account is sent to the corresponding instant messaging application through the agreed API; after the instant messaging application receives the corresponding communication identification 3002, it can intercept the message initiated by the account of the instant messaging application corresponding to the communication identification 3002. video calls and intercepting Internet text messages, Internet calls, messages and/or audio and video calls sent by the account of the instant messaging application corresponding to the communication identifier 3002.
  • the first electronic device and/or the first server may assign the one or more communication identifications to In 3002, the accounts of different instant messaging applications and the account logged in by the first user on the different instant messaging applications are sent to the application servers corresponding to the different instant messaging applications, so that the servers of the different instant messaging applications can intercept undesirable persons.
  • the first server updates one or more communication identifiers 3002 to obtain one or more communication identifiers 3003.
  • the difference between the communication identification 3003 and the communication identification 3002 is that when the first server executes step S303, the communication identification 3003 is not associated with the communication identification in the blacklist, or the communication identification 3003 does not exist (not registered); in the first server After step S303 is executed, the communication identification 3003 is associated with the communication identification in the blacklist.
  • the association between the communication identifier 3003 and the communication identifiers in the blacklist may be established by the application server corresponding to the instant messaging application, or may be established by the electronic device of the undesirable person. For example, the binding of different instant messaging application accounts is established by the application server, or the communication identifier 3003 is a newly registered account. For another example, if a new SIM card is inserted into the electronic device of the unwanted person, the cellular number corresponding to the newly inserted SIM card is the communication identification 3003.
  • the first server has multiple methods to determine one or more communication identifiers 3003, which are not limited here. Several methods are illustratively introduced below.
  • the first server may periodically update one or more communication identifiers 3002 to obtain one or more communication identifiers 3003. For example, when an unwanted person registered using cellular number 1 account, the The account is account 1, and the cellular number 1 belongs to the one or more communication identifiers 3002, then the first server updates a Account 1 is included in one or more communication identifiers 3003 obtained from the communication identifiers 3002 or multiple communication identifiers 3002 .
  • the first server after detecting the new communication identification operation of the undesirable person, updates the communication identification of the unwelcome person, which is recorded as communication identification 3003.
  • the application server corresponding to the instant messaging application when the unwanted person uses cellular number 1 to register an account of the instant messaging application, such as Changlian account 1, the application server corresponding to the instant messaging application sends a request to The first server sends a message indicating an association between the cellular number 1 and the account of the unwanted person's instant messaging application.
  • the first server may determine that one or more communication identifiers 3003 include the account of the undesirable instant messaging application.
  • the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
  • the first server is the application server corresponding to the instant messaging application
  • the unwanted person uses cellular number 1 to register an account of the instant messaging application, such as Changlian account 1
  • the first server determines that the uninvited person A new cellular number 1 is added to the greeter's communication identifier.
  • cell number 1 belongs to communication identifier 3003.
  • the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
  • the first server is a server corresponding to the operating system
  • the application corresponding to the instant messaging application The server sends a message to the first server indicating that cellular number 2 is associated with an account of the unwanted person's instant messaging application.
  • the first server may determine that one or more communication identifiers 3003 include cellular number 2.
  • the first server is an application server corresponding to an instant messaging application
  • the first server determines The undesirable person's communication identifier has a new cell number 2.
  • cell number 2 belongs to communication identifier 3003.
  • the first server is a server corresponding to the operating system
  • the application corresponding to the instant messaging application The server sends a message to the first server indicating that cellular number 2 is associated with an account of the unwanted person's instant messaging application.
  • the first server may determine that one or more communication identifiers 3003 include cellular number 2.
  • the first server can interact with the application server, and the first server sends the communication identifier 3002 to the application server. After the application server determines that there is a new communication identifier 3003 associated with the communication identifier 3002, the application server sends a communication to the first server.
  • the application server sends communication identification 3003 and communication identification 3002 to the first server.
  • the application server can send it through a specific interface or carry the identifier in the message.
  • the interface or the identifier is used to indicate that the communication identifier 3003 is associated with a certain communication identifier 3002 .
  • the message sent by the application server to the first server carries the communication identifier 3003 and the identifier of the undesirable person.
  • the application server since in step S303, the first server has inquired the application server about the communication identification of the undesirable person, the application server can determine that the user with the newly added communication identification 3003 is an undesirable person.
  • the first server is a server corresponding to the operating system
  • the second A system application on an electronic device such as a mobile phone manager
  • the message is used to inform the first server that the undesirable person's communication identifier has a new cellular number 1; then, the first server can determine a or Multiple communication identifiers 3003 include the cell number 1.
  • the first server sends message 3 to the first electronic device, where message 3 includes part or all of one or more communication identifiers 3003.
  • the first server may send a message 3 to the first electronic device, where the message 3 includes a communication identifier that is different from the one or more communication identifiers 3002 among the one or more communication identifiers 3003 .
  • the first server may synchronize the cellular numbers in one or more communication identifiers 3003 to the first electronic device.
  • the first server can synchronize the cellular numbers in one or more communication identifiers 3003 with the operator server.
  • the operator server may intercept the cellular number in one or more communication identifiers 3003 to initiate a cellular call and/or cellular text message to the cellular number on the first electronic device.
  • the first electronic device updates the blacklist based on part or all of one or more communication identifiers 3003.
  • step S305 For the operation of updating the blacklist by the first electronic device, reference can be made to the textual description of step S305 above, which will not be described again here.
  • the first server stores a blacklist
  • the blacklist on the first server stores complete communication identifications of undesirable persons.
  • the blacklist on the first electronic device stores complete communication identifiers of the undesirable persons, or the blacklist on the first electronic device stores the cellular numbers of the undesirable persons.
  • the first electronic device obtains the communication identifier of the undesirable person through the first server and adds the communication identifier of the undesirable person to the blacklist.
  • the first electronic device or the first server can obtain the communication identification of the undesirable person as complete as possible through multiple associations, as shown in Figure 4A below. , shown in Figure 4B and Figure 4C.
  • the first server may be a server corresponding to the operating system
  • the second server and the third server may be application servers corresponding to the instant messaging application.
  • FIG. 4A is an exemplary schematic diagram of determining one or more communication identifiers 3002 provided by the embodiment of the present application.
  • the communication identifier 3001 is cell number 1.
  • the communication identifier 3002 includes: account 1, mailbox 1, and cellular number 2.
  • account 1 is an instant messaging application account.
  • the communication identifier 3002 includes: account 1, mailbox 1, cell number 2, and mailbox 2.
  • the first electronic device may also perform multiple associations.
  • FIG. 4B is an exemplary schematic diagram of the first server determining one or more communication identifiers 3002 provided by the embodiment of the present application.
  • S4B01 The first server sends query request 1 to the second server, and query request 1 includes communication identification 1.
  • communication identification 1 belongs to communication identification 3001 or communication identification 3002; the second server is an application server corresponding to the instant messaging application.
  • S4B02 The first server sends query request 2 to the third server.
  • Query request 2 includes communication identification 1.
  • the third server is an application server corresponding to the instant messaging application.
  • the instant messaging applications corresponding to the second server and the third server are different.
  • the second server determines one or more communication identifiers 2 based on the communication identifier 1.
  • one or more communication identifiers 2 belong to communication identifier 3002.
  • S4B04 The third server determines one or more communication identifiers 3 based on the communication identifier 1.
  • one or more communication identifiers 3 belong to the communication identifier 3002.
  • the second server sends query result 1 to the first server.
  • the query result 1 includes one or more communication identifiers. 2.
  • the third server sends the query result 2 to the first server.
  • the query result 2 includes one or more communication identifiers 3.
  • the first server sends a query request 3 to the third server.
  • the query request 3 includes one or more communication identifiers 2.
  • S4B08 The third server determines one or more communication identifiers 4 based on the one or more communication identifiers 2.
  • one or more communication identifiers 4 belong to the communication identifier 3002.
  • the third server sends the query result 3 to the first server.
  • the query result 3 includes one or more communication identifiers 4.
  • steps S4B01 to step S4B06 can be the first association; steps S4B07 to step S4B09 can be the second association, so that the first server can determine as complete as possible A communication sign belonging to an undesirable person.
  • FIG. 4C is an exemplary schematic diagram of the first electronic device determining one or more communication identifiers 3002 provided by the embodiment of the present application.
  • S4C01 The first electronic device sends query request 1 to the second server, where query request 1 includes communication identification 1.
  • S4C02 The first electronic device sends query request 2 to the third server.
  • Query request 2 includes communication identification 1.
  • the second server determines one or more communication identifiers 2 based on the communication identifier 1.
  • S4C04 The third server determines one or more communication identifiers 3 based on the communication identifier 1.
  • S4C05 The second server sends query result 1 to the first electronic device.
  • Query result 1 includes one or more communication identifiers 2.
  • the third server sends the query result 2 to the first electronic device.
  • the query result 2 includes one or more communication identifiers 3.
  • the first electronic device sends a query request 3 to the third server.
  • the query request 3 includes one or more communication identifiers 2.
  • S4C08 The third server determines one or more communication identifiers 4 based on one or more communication identifiers 2.
  • S4C09 The third server sends query result 3 to the first electronic device, where query result 3 includes one or more communication identifiers 4.
  • steps S4C01 to step S4C06 can be the first association; steps S4C07 to step S4C09 can be the second association, so that the first electronic device can determine that it is as complete as possible A communication sign belonging to an undesirable person.
  • the first server serves as a server for querying association relationships
  • the first electronic device serves as an interceptor of communication.
  • the first electronic device interacts with the first server to obtain the communication identification of the undesirable person.
  • the first electronic device can independently determine the communication identification of the undesirable person, as shown in Figure 4D below.
  • Figure 4D is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • account 1 is communication identifier 3001.
  • S4D02 Instant messaging application 1 sends message 1 to the system application, and message 1 includes cellular number 1.
  • cell number 1 is communication identifier 3002.
  • the instant messaging application 1 may communicate with the server corresponding to the application to determine that the communication identifier associated with account 1 includes account 1.
  • a contact's contact details in the app include the contact's cellular number.
  • message 1 also includes account 1.
  • the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the first user's blacklist.
  • the first user's blacklist is a blacklist of accounts logged in by the first user in the instant messaging application 1.
  • S4D04 Optionally, the system application adds account 1 to the first user's blacklist.
  • S4D05 The system application adds cellular number 1 to the first user's blacklist.
  • S4D06 The system application sends message 2 to instant messaging application 2, and message 2 includes cellular number 1.
  • the instant messaging application 1 adds the account 2 corresponding to the cellular number 1 to the first user's blacklist.
  • the instant messaging application 2 may communicate with the server corresponding to the application to determine that the communication identifier associated with account 1 includes account 1.
  • the instant messaging application 2 sends message 3 to the system application, and the message 3 includes account 2.
  • S4D09 Optionally, the system application adds account 2 to the first user's blacklist.
  • the system application on the first electronic device can also perform multiple associations.
  • the system application determines that cellular number 1 is the communication identifier of an undesirable person, it queries the instant messaging application 1 for the associated result of cellular number 1, which is account 1 and cellular number 2, and queries the instant messaging application 2 for cellular number 1.
  • the association result is account 2.
  • the system application can query the instant messaging application 2 that the associated result of the cellular number 2 is account 3.
  • the result of the first association performed by the first electronic device is account 1, account 2, and cellular number 2; the result of the second association performed by the second electronic device is account 3.
  • Figure 5 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • the first electronic device is the user's electronic device
  • the second electronic device is the unwanted person's electronic device.
  • the first server may be a server corresponding to the operating systems of the first electronic device and the second electronic device, or may be an application server corresponding to the instant messaging application.
  • S501 The first electronic device determines that the communication identifier 3001 is added to the blacklist.
  • step S501 For the content of step S501, reference can be made to the text description in step S301, which will not be described again here.
  • S502 The first electronic device sends the communication identification 3001 to the first server.
  • the first server determines that the electronic device of the undesirable person is the second electronic device based on the communication identification 3001.
  • the first server stores communication identification sets of different users; when the first server determines that the communication identification 3001 belongs to the communication identification set of an undesirable person, the undesirable person can be Each communication identification in the set of communication identifications serves as one or more associated communication identifications 3002.
  • the first server may determine the second electronic device based on the communication identifier 3001, such as the account of the undesirable person's instant messaging application.
  • the first server sends an interception instruction to the second electronic device, where the interception instruction includes the communication identification of the first user.
  • the communication identification of the first user may include the cellular number on the first electronic device, and the account of the instant messaging application on the first electronic device.
  • the first server can also associate the communication identification of the first user to obtain the communication identification of the first user as complete as possible.
  • the communication identification of the first user can also associate the communication identification of the first user to obtain the communication identification of the first user as complete as possible.
  • S505 The second electronic device intercepts the communication initiated to the first user.
  • the second electronic device can intercept communications initiated to the first user, such as cellular phone calls, cellular text messages, and audio and video calls. , messages, Internet calls and/or Internet SMS.
  • the first server when the first server is an application server corresponding to an instant messaging application, the first server may determine the account of the instant messaging application logged in by the first user. For example, in step S502, the first electronic device also sends parameters for determining the account of the user's instant messaging application to the first server, such as the account of the user's instant messaging application. The first server sends the user's communication identification to the second electronic device including an identification of an account of the user's instant messaging application.
  • the first server when the first server is a server corresponding to the operating system, the first server can determine the user's communication identifier, such as a cellular number, an account of an instant messaging application, etc.
  • the system application on the second electronic device such as the mobile phone manager, after obtaining the user's communication identification, can send the account of the instant messaging application in the user's communication identification to the corresponding instant messaging application through the agreed API, allowing instant communication
  • the application can intercept Internet calls, Internet text messages, emails, messages and/or audio and video calls initiated by unwanted persons to the user.
  • the system application on the second electronic device such as a mobile phone manager, can intercept cellular calls and cellular text messages initiated by the second electronic device after obtaining the user's communication identifier.
  • Figure 6 is another exemplary schematic diagram of the process of the account shielding method provided by the embodiment of the present application.
  • S601 The system application determines that cellular number 1 is added to the blacklist.
  • the cellular number 1 belongs to the communication identifier 3001.
  • the communication identifier 3001 For specific content, please refer to the text description of step S301 above, which will not be described again here.
  • S602 The system application sends a query request 1 to the instant messaging application 1, and the query request 1 includes the cellular number 1.
  • system applications can include address book and mobile phone manager.
  • query requests can be sent through the agreed API.
  • the instant messaging application 1 adds the account 1 corresponding to the cellular number 1 to the first user's blacklist.
  • the first user's blacklist is a blacklist of accounts logged in by the first user in the instant messaging application 1.
  • cell number 1 and account 1 are the communication identifiers of the undesirable person.
  • account 1 is communication identifier 3002.
  • the instant messaging application 1 sends a query request 2 to the server 1.
  • the query request 2 includes the cellular number 1 and/or the account 1.
  • server 1 is the server corresponding to instant messaging application 1.
  • Server 1 determines mailbox 1 based on cellular number 1 and/or account 1.
  • server 1 will add account 1 to the first user's blacklist.
  • step S606 may not be executed; if step S603 has not been executed, step S606 needs to be executed.
  • Server 1 sends the query result to instant messaging application 1, and the query result includes mailbox 1.
  • mailbox 1 is communication identifier 3002.
  • S608 The instant messaging application 1 sends the query result to the system application, and the query result includes the mailbox 1.
  • the query results also include account 1.
  • Figure 7 is an exemplary schematic diagram of intercepting communications in the account shielding method provided by the embodiment of the present application.
  • S701 The instant messaging application 1 on the second electronic device initiates communication to the instant messaging application 1 on the first electronic device.
  • communication can be Internet phone calls, Internet text messages, emails, messages and/or audio and video calls.
  • the second electronic device is the electronic device of the undesirable person
  • the account logged in by the instant messaging application 1 on the second electronic device is account 2
  • the account logged in by the instant messaging application 1 on the first electronic device is account 1 .
  • S702 The instant messaging application 1 sends a query request 1 to the system application, and the query request includes account 2.
  • steps S702 and S703 are optional steps.
  • S703 The system application sends query result 1 to instant messaging application 1, and query result 1 includes confirmation information.
  • the blacklist stores the communication identifiers of undesirable persons.
  • account 2 belongs to the blacklist.
  • the instant messaging application intercepts communications initiated by the instant messaging application on the second electronic device, such as Internet calls, Internet text messages, messages, and audio and video calls.
  • the server corresponding to the instant messaging application 1 if the server can send a query request 1 to the server corresponding to the operating system, then after receiving the query result, the server corresponding to the instant messaging application 1 The server intercepts.
  • the communication system provided by the embodiment of the present application the hardware architecture and software architecture of the first electronic device, the second electronic device and the server provided by the embodiment of the present application are introduced.
  • the hardware architecture and software architecture of the first electronic device and the second electronic device may be the same, so in the following, the first electronic device and the second electronic device are referred to as electronic devices.
  • Figure 8 is an exemplary schematic diagram of a communication system provided by an embodiment of the present application.
  • the communication system provided by the embodiment of the present application may include a first electronic device and a second electronic device.
  • the first electronic device is the electronic device of the first user
  • the second electronic device is the electronic device of the undesirable user
  • the communication system may also include one or more servers.
  • the one or more servers may include servers corresponding to operating systems and/or application servers corresponding to instant messaging applications.
  • FIG. 9 is an exemplary schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • the electronic device may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, as well as a cellular phone, a personal digital assistant (personal digital assistant) assistant (PDA), augmented reality (AR) devices electronic equipment, virtual reality (VR) equipment, artificial intelligence (AI) equipment, wearable equipment, vehicle-mounted equipment, smart home equipment and/or smart city equipment.
  • PDA personal digital assistant
  • AR augmented reality
  • AR electronic equipment
  • VR virtual reality
  • AI artificial intelligence
  • wearable equipment wearable equipment
  • vehicle-mounted equipment smart home equipment and/or smart city equipment.
  • the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194, and user Identification module (subscriber identification module, SIM) card interface 195, etc.
  • a processor 110 an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, Mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen
  • the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
  • the structures illustrated in the embodiments of the present invention do not constitute specific limitations on the electronic equipment.
  • the electronic device may include more or less components than shown in the figures, or some components may be combined, some components may be separated, or some components may be arranged differently.
  • the components illustrated may be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc.
  • application processor application processor, AP
  • modem processor graphics processing unit
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller video codec
  • digital signal processor digital signal processor
  • DSP digital signal processor
  • baseband processor baseband processor
  • neural network processor neural-network processing unit
  • the controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
  • the processor 110 may also be provided with a memory for storing instructions and data.
  • the memory in processor 110 is cache memory. This memory may hold instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
  • processor 110 may include one or more interfaces.
  • Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /or universal serial bus (USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • UART universal asynchronous receiver and transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus, including a serial data line (SDA) and a serial clock line (derail clock line, SCL).
  • processor 110 may include multiple sets of I2C buses.
  • the processor 110 can separately couple the touch sensor 180K, charger, flash, camera 193, etc. through different I2C bus interfaces.
  • the processor 110 can be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to implement the touch function of the electronic device.
  • the I2S interface can be used for audio communication.
  • processor 110 may include multiple sets of I2S buses.
  • the processor 110 can be coupled with the audio module 170 through the I2S bus to implement communication between the processor 110 and the audio module 170 .
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface to implement the function of answering calls through a Bluetooth headset.
  • the PCM interface can also be used for audio communications to sample, quantize and encode analog signals.
  • audio Module 170 and wireless communication module 160 may be coupled through a PCM bus interface.
  • the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface to implement the function of answering calls through a Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
  • the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface to implement the function of playing music through a Bluetooth headset.
  • the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
  • MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
  • the processor 110 and the camera 193 communicate through a CSI interface to implement the shooting function of the electronic device.
  • the processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device.
  • the GPIO interface can be configured through software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 110 with the camera 193, display screen 194, wireless communication module 160, audio module 170, sensor module 180, etc.
  • the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 130 is an interface that complies with the USB standard specification, and may be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
  • the USB interface 130 can be used to connect a charger to charge the electronic device, and can also be used to transmit data between the electronic device and peripheral devices. It can also be used to connect headphones to play audio through them. This interface can also be used to connect other electronic devices, such as AR devices, etc.
  • the interface connection relationships between the modules illustrated in the embodiments of the present invention are only schematic illustrations and do not constitute structural limitations on the electronic equipment.
  • the electronic device may also adopt different interface connection methods in the above embodiments, or a combination of multiple interface connection methods.
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
  • the charging management module 140 may receive wireless charging input through a wireless charging coil of the electronic device. While the charging management module 140 charges the battery 142, it can also provide power to the electronic device through the power management module 141.
  • the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, the wireless communication module 160, and the like.
  • the power management module 141 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 141 may also be provided in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be provided in the same device.
  • the wireless communication function of the electronic device can be realized through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in an electronic device can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • Antenna 1 can be reused as a diversity antenna for a wireless LAN.
  • antennas may be used in conjunction with tuning switches.
  • the mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G applied to electronic devices.
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier amplifier, LNA), etc.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used to modulate the low-frequency baseband signal to be sent into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194.
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (BT), and global navigation satellite systems for use in electronic devices. (global navigation satellite system, GNSS), frequency modulation (FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi) -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the electronic device implements display functions through the GPU, display screen 194, and application processor.
  • the GPU is an image processing microprocessor and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the display screen 194 is used to display images, videos, etc.
  • Display 194 includes a display panel.
  • the display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode).
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • AMOLED organic light-emitting diode
  • FLED flexible light-emitting diode
  • Miniled MicroLed, Micro-oLed, quantum dot light emitting diode (QLED), etc.
  • the electronic device may include 1 or N display screens 194, where N is a positive integer greater than 1.
  • Electronic devices can use ISPs, cameras 193 , video codecs, GPUs, displays 194 and application processors Wait for the shooting function to be realized.
  • the ISP is used to process the data fed back by the camera 193. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise and brightness. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193.
  • Camera 193 is used to capture still images or video.
  • the object passes through the lens to produce an optical image that is projected onto the photosensitive element.
  • the photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal.
  • ISP outputs digital image signals to DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other format image signals.
  • the electronic device may include 1 or N cameras 193, where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
  • Video codecs are used to compress or decompress digital video.
  • Electronic devices may support one or more video codecs. In this way, electronic devices can play or record videos in multiple encoding formats, such as: Moving Picture Experts Group (MPEG)1, MPEG2, MPEG3, MPEG4, etc.
  • MPEG Moving Picture Experts Group
  • MPEG2 MPEG2, MPEG3, MPEG4, etc.
  • NPU is a neural network (NN) computing processor.
  • NN neural network
  • Intelligent cognitive applications of electronic devices can be realized through NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
  • the internal memory 121 may include one or more random access memories (RAM) and one or more non-volatile memories (NVM).
  • RAM random access memories
  • NVM non-volatile memories
  • Random access memory can include static random-access memory (SRAM), dynamic random-access memory (DRAM), synchronous dynamic random-access memory (SDRAM), double data rate synchronous Dynamic random access memory (double data rate synchronous dynamic random access memory, DDR SDRAM, such as the fifth generation DDR SDRAM is generally called DDR5SDRAM), etc.;
  • SRAM static random-access memory
  • DRAM dynamic random-access memory
  • SDRAM synchronous dynamic random-access memory
  • DDR SDRAM double data rate synchronous Dynamic random access memory
  • DDR SDRAM double data rate synchronous dynamic random access memory
  • DDR5SDRAM double data rate synchronous dynamic random access memory
  • Non-volatile memory can include disk storage devices and flash memory.
  • Flash memory can be divided according to the operating principle to include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc.
  • the storage unit potential level it can include single-level storage cells (single-level cell, SLC), multi-level storage cells (multi-level cell, MLC), third-level storage unit (triple-level cell, TLC), fourth-level storage unit (quad-level cell, QLC), etc., which can include universal flash storage (English: universal flash storage, UFS) according to storage specifications. , embedded multi media card (embedded multi media Card, eMMC), etc.
  • the random access memory can be directly read and written by the processor 110, can be used to store executable programs (such as machine instructions) of the operating system or other running programs, and can also be used to store user and application data, etc.
  • the non-volatile memory can also store executable programs and user and application program data, etc., and can be loaded into the random access memory in advance for direct reading and writing by the processor 110.
  • the external memory interface 120 can be used to connect an external non-volatile memory to expand the storage capacity of the electronic device.
  • the external non-volatile memory communicates with the processor 110 through the external memory interface 120 to implement the data storage function. For example, save music, video and other files in external non-volatile memory.
  • the electronic device can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
  • Speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
  • the electronic device can listen to music through speaker 170A, or listen to hands-free calls.
  • Receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the electronic device answers a call or a voice message, the voice can be heard by bringing the receiver 170B close to the human ear.
  • Microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 170C with the human mouth and input the sound signal to the microphone 170C.
  • the electronic device may be provided with at least one microphone 170C. In other embodiments, the electronic device may be provided with two microphones 170C, which in addition to collecting sound signals, may also implement a noise reduction function. In other embodiments, the electronic device can also be equipped with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions, etc.
  • the headphone interface 170D is used to connect wired headphones.
  • the headphone interface 170D may be a USB interface 130, or may be a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA Cellular Telecommunications Industry Association of the USA
  • the pressure sensor 180A is used to sense pressure signals and can convert the pressure signals into electrical signals.
  • pressure sensor 180A may be disposed on display screen 194 .
  • pressure sensors 180A there are many types of pressure sensors 180A, such as resistive pressure sensors, inductive pressure sensors, capacitive pressure sensors, etc.
  • a capacitive pressure sensor may include at least two parallel plates of conductive material.
  • the electronic device detects the strength of the touch operation according to the pressure sensor 180A.
  • the electronic device may also calculate the touched position based on the detection signal of the pressure sensor 180A.
  • touch operations acting on the same touch location but with different touch operation intensities may correspond to different operation instructions. For example: when a touch operation with a touch operation intensity less than the first pressure threshold is applied to the short message application icon, an instruction to view the short message is executed. When a touch operation with a touch operation intensity greater than or equal to the first pressure threshold is applied to the short message application icon, an instruction to create a new short message is executed.
  • the gyro sensor 180B can be used to determine the motion posture of the electronic device. In some embodiments, the angular velocity of the electronic device about three axes (ie, x, y, and z axes) may be determined by gyro sensor 180B.
  • the gyro sensor 180B can be used for image stabilization. For example, when the shutter is pressed, the gyro sensor 180B detects the angle at which the electronic device shakes, and calculates the distance that the lens module needs to compensate based on the angle, so that the lens can offset the shake of the electronic device through reverse movement to achieve anti-shake.
  • the gyro sensor 180B can also be used for navigation and somatosensory game scenes.
  • Air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronic device calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist positioning and navigation.
  • Magnetic sensor 180D includes a Hall sensor.
  • the electronic device can use the magnetic sensor 180D to detect the opening and closing of the flip holster.
  • the electronic device may detect opening and closing of the flip according to the magnetic sensor 180D. Then, based on the detected opening and closing status of the leather case or the opening and closing status of the flip cover, features such as automatic unlocking of the flip cover are set.
  • the acceleration sensor 180E can detect the acceleration of the electronic device in various directions (generally three axes). When the electronic device is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices and be used in horizontal and vertical screen switching, pedometer and other applications.
  • Distance sensor 180F for measuring distance.
  • Electronic devices can measure distance via infrared or laser. In some implementations, in shooting scenes, electronic devices can use the distance sensor 180F to measure distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode.
  • the light emitting diode may be an infrared light emitting diode.
  • Electronic devices emit infrared light through light-emitting diodes.
  • Electronic devices use photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device. When insufficient reflected light is detected, the electronic device can determine that there is no object near the electronic device.
  • Electronic devices can use the proximity light sensor 180G to detect when the user holds the electronic device close to the ear and talk, so that the screen can be automatically turned off to save power.
  • the proximity light sensor 180G can also be used in holster mode, and pocket mode automatically unlocks and locks the screen.
  • the ambient light sensor 180L is used to sense ambient light brightness.
  • the electronic device can adaptively adjust the brightness of the display screen 194 based on perceived ambient light brightness.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device is in the pocket to prevent accidental touching.
  • Fingerprint sensor 180H is used to collect fingerprints. Electronic devices can use the collected fingerprint characteristics to unlock fingerprints, access application locks, take photos with fingerprints, answer incoming calls with fingerprints, etc.
  • Temperature sensor 180J is used to detect temperature.
  • the electronic device uses the temperature detected by the temperature sensor 180J to execute the temperature processing strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device reduces the performance of a processor located near the temperature sensor 180J in order to reduce power consumption and implement thermal protection. In other embodiments, when the temperature is lower than another threshold, the electronic device heats the battery 142 to prevent the low temperature from causing abnormal shutdown of the electronic device. In some other embodiments, when the temperature is lower than another threshold, the electronic device performs boosting on the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 180K also known as "touch device”.
  • the touch sensor 180K can be disposed on the display screen 194.
  • the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near the touch sensor 180K.
  • the touch sensor can pass the detected touch operation to the application processor to determine the touch event type.
  • Visual output related to the touch operation may be provided through display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the electronic device at a location different from that of the display screen 194 .
  • Bone conduction sensor 180M can acquire vibration signals.
  • the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human body's vocal part.
  • the bone conduction sensor 180M can also contact the human body's pulse and receive blood pressure beating signals.
  • the bone conduction sensor 180M can also be provided in an earphone and combined into a bone conduction earphone.
  • the audio module 170 can analyze the voice signal based on the vibration signal of the vocal vibrating bone obtained by the bone conduction sensor 180M to implement the voice function.
  • the application processor can analyze the heart rate information based on the blood pressure beating signal acquired by the bone conduction sensor 180M to implement the heart rate detection function.
  • the buttons 190 include a power button, a volume button, etc.
  • Key 190 may be a mechanical key. It can also be a touch button.
  • the electronic device can receive key input and generate key signal input related to user settings and function control of the electronic device.
  • the motor 191 can generate vibration prompts.
  • the motor 191 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback.
  • touch operations for different applications can correspond to different vibration feedback effects.
  • the motor 191 can also respond to different vibration feedback effects for touch operations in different areas of the display screen 194 .
  • Different application scenarios such as time reminders, receiving information, alarm clocks, games, etc.
  • the touch vibration feedback effect can also be customized.
  • the indicator 192 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
  • the SIM card interface 195 is used to connect a SIM card.
  • the SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to realize contact and separation from the electronic device.
  • the electronic device can support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
  • SIM card interface 195 can support Nano SIM card, Micro SIM card, SIM card, etc. same Each SIM card interface 195 can insert multiple cards at the same time. The types of the plurality of cards may be the same or different.
  • the SIM card interface 195 is also compatible with different types of SIM cards.
  • the SIM card interface 195 is also compatible with external memory cards.
  • Electronic devices interact with the network through SIM cards to implement functions such as calls and data communications.
  • the electronic device uses an eSIM, that is, an embedded SIM card.
  • the eSIM card can be embedded in the electronic device and cannot be separated from the electronic device.
  • Software systems of electronic devices can adopt layered architecture, event-driven architecture, microkernel architecture, microservice architecture, or cloud architecture.
  • the embodiment of the present invention takes the Android system with a layered architecture as an example to illustrate the software structure of the electronic device.
  • FIG. 10 is an exemplary schematic diagram of the software architecture of the electronic device provided by the embodiment of the present application.
  • the layered architecture divides the software into several layers, and each layer has clear roles and division of labor.
  • the layers communicate through software interfaces.
  • the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime and system libraries, and kernel layer.
  • the application layer can include a series of application packages.
  • the application package can include camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message and other applications.
  • the application framework layer provides an application programming interface (API) and programming framework for applications in the application layer.
  • API application programming interface
  • the application framework layer includes some predefined functions.
  • the application framework layer can include a window manager, content provider, view system, phone manager, resource manager, notification manager, etc.
  • a window manager is used to manage window programs.
  • the window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and retrieve data and make this data accessible to applications.
  • Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
  • the view system includes visual controls, such as controls that display text, controls that display pictures, etc.
  • a view system can be used to build applications.
  • the display interface can be composed of one or more views.
  • a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
  • Telephone managers are used to provide communication functions of electronic devices. For example, call status management (including connected, hung up, etc.).
  • the resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc.
  • the notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a beep sounds, the electronic device vibrates, the indicator light flashes, etc.
  • Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
  • the core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
  • the application layer and application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application layer and application framework layer into binary files.
  • the virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
  • System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (Media Libraries), 3D graphics processing libraries (for example: OpenGL ES), 2D graphics engines (for example: SGL), etc.
  • the surface manager manages the display subsystem and provides integration of 2D and 3D layers for multiple applications. combine.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing.
  • 2D Graphics Engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
  • the phone manager may be responsible for performing the interception of unwanted cell phone calls and cell text messages.
  • the phone manager may also be responsible for executing emails, Internet calls, Internet text messages, messages, and short video communications from unwanted persons.
  • FIG. 11A is an exemplary schematic diagram of data flow during the process of adding a communication identifier to a blacklist database by a first electronic device according to an embodiment of the present application.
  • the instant messaging application will send the account to the system application.
  • the account is the communication identifier of the undesirable person.
  • the system application may be a mobile phone manager, or a service running on the operating system, such as a phone manager.
  • the blacklist library is located in the internal memory 121.
  • the blacklist database may also be located in the server corresponding to the operating system.
  • the blacklist database is saved locally in the form of a configuration file.
  • FIG. 11B is an exemplary schematic diagram of an instant messaging application intercepting audio and video calls or messages according to an embodiment of the present application.
  • the instant messaging application After receiving an audio or video call or message, the instant messaging application queries whether the peer's communication identifier is in the blacklist.
  • the instant messaging application determines that the peer's communication identifier is in the blacklist, it will intercept the audio and video call or message.
  • Figure 11C is another exemplary schematic diagram of the instant messaging application intercepting Internet calls or Internet text messages provided by the embodiment of the present application.
  • the instant messaging application or system application After receiving an Internet call or an Internet text message, the instant messaging application or system application sends a query request to the phone manager.
  • the query request includes the communication identifier of the peer user.
  • the phone manager queries whether the communication ID of the peer user belongs to the blacklist database.
  • the phone manager After the phone manager determines that the user's communication identifier belongs to the blacklist library, the phone manager sends an instruction message to the instant messaging application or system application.
  • the instruction message is used to instruct the communication application or system application to intercept Internet calls or Internet text messages.
  • the instant messaging application can also determine whether to intercept in the manner shown in Figure 11C.
  • the term “when” may be interpreted to mean “if" or “after” or “in response to determining" or “in response to detecting" depending on the context.
  • the phrase “when determining" or “if (stated condition or event) is detected” may be interpreted to mean “if it is determined" or “in response to determining" or “when (stated condition or event) is detected” or “in response to upon detection of (stated condition or event)”.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted over a wired connection from a website, computer, server, or data center (such as coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) means to transmit to another website, computer, server or data center.
  • the computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state drive), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Les formes de réalisation de la présente invention concernent un procédé de protection de compte, un système de communication et un dispositif électronique. Selon le procédé de protection de compte, une association peut être exécutée par rapport à un identifiant de communication ajouté à une liste de protection par un utilisateur, de sorte qu'une pluralité d'autres identifiants de communication sont obtenus ; et après que l'identifiant de communication ajouté à la liste de protection est associé aux autres identifiants de communication, l'identifiant de communication nouvellement ajouté est également ajouté à la liste de protection, de sorte qu'un serveur ou un dispositif électronique peut intercepter une communication correspondant à la liste de protection. Le procédé de protection de compte fourni par la présente invention peut déterminer plus d'identifiants de communication qui ne sont pas souhaités, de telle sorte que l'utilisateur n'est pas perturbé par une communication non souhaitée.
PCT/CN2023/094171 2022-05-16 2023-05-15 Procédé de protection de compte, système de communication et dispositif électronique WO2023221917A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202210529855.8 2022-05-16
CN202210529855 2022-05-16
CN202211062344.6 2022-08-31
CN202211062344.6A CN117119098A (zh) 2022-05-16 2022-08-31 账户屏蔽方法、通信系统及电子设备

Publications (1)

Publication Number Publication Date
WO2023221917A1 true WO2023221917A1 (fr) 2023-11-23

Family

ID=88807925

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/094171 WO2023221917A1 (fr) 2022-05-16 2023-05-15 Procédé de protection de compte, système de communication et dispositif électronique

Country Status (2)

Country Link
CN (1) CN117119098A (fr)
WO (1) WO2023221917A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449474B1 (en) * 1999-11-19 2002-09-10 Nortel Networks Limited Method and apparatus for call interception capabilities for use with intelligent network services in a communications system
CN102970362A (zh) * 2012-11-15 2013-03-13 北京小米科技有限责任公司 一种云端数据共享的方法及装置
US20140128047A1 (en) * 2012-11-02 2014-05-08 Lookout, Inc. System and method for call blocking and sms blocking
WO2016011614A1 (fr) * 2014-07-23 2016-01-28 华为技术有限公司 Procédé et dispositif pour bloquer un numéro de harcèlement
CN107580357A (zh) * 2017-10-27 2018-01-12 努比亚技术有限公司 一种黑名单用户的限制通信方法、设备及计算机存储介质
CN107911530A (zh) * 2017-11-27 2018-04-13 努比亚技术有限公司 消息提醒方法、通信拦截方法、终端及计算机存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6449474B1 (en) * 1999-11-19 2002-09-10 Nortel Networks Limited Method and apparatus for call interception capabilities for use with intelligent network services in a communications system
US20140128047A1 (en) * 2012-11-02 2014-05-08 Lookout, Inc. System and method for call blocking and sms blocking
CN102970362A (zh) * 2012-11-15 2013-03-13 北京小米科技有限责任公司 一种云端数据共享的方法及装置
WO2016011614A1 (fr) * 2014-07-23 2016-01-28 华为技术有限公司 Procédé et dispositif pour bloquer un numéro de harcèlement
CN107580357A (zh) * 2017-10-27 2018-01-12 努比亚技术有限公司 一种黑名单用户的限制通信方法、设备及计算机存储介质
CN107911530A (zh) * 2017-11-27 2018-04-13 努比亚技术有限公司 消息提醒方法、通信拦截方法、终端及计算机存储介质

Also Published As

Publication number Publication date
CN117119098A (zh) 2023-11-24

Similar Documents

Publication Publication Date Title
AU2019385366B2 (en) Voice control method and electronic device
CN113542485B (zh) 一种通知处理方法、电子设备及计算机可读存储介质
WO2021036770A1 (fr) Procédé de traitement d'écran partagé et dispositif terminal
WO2020155014A1 (fr) Système et un procédé de partage de dispositif domestique intelligent, et dispositif électronique
WO2020150917A1 (fr) Procédé de gestion d'autorisation d'application et dispositif électronique
WO2021159746A1 (fr) Procédé et système de partage de fichiers et dispositif associé
WO2021253975A1 (fr) Procédé et appareil de gestion d'autorisation pour application, et dispositif électronique
CN113806105B (zh) 消息处理方法、装置、电子设备和可读存储介质
WO2021052204A1 (fr) Procédé de découverte de dispositif basé sur un carnet d'adresses, procédé de communication audio et vidéo, et dispositif électronique
WO2020259554A1 (fr) Procédé de recherche de mot-clé basé sur l'apprentissage et dispositif électronique
WO2023273540A1 (fr) Procédé de prévention d'appels manqués, système, dispositif électronique et support de stockage
WO2021218429A1 (fr) Procédé de gestion d'une fenêtre d'application, dispositif terminal et support de stockage lisible par ordinateur
EP3852344A1 (fr) Procédé et dispositif de résolution de nom de domaine par envoi de valeur de clé à un serveur grs
WO2022253158A1 (fr) Procédé et appareil de protection de la confidentialité d'un utilisateur
WO2020151408A1 (fr) Procédé d'affichage de contacts et dispositif associé
CN115543145A (zh) 一种文件夹管理方法及装置
CN114006698B (zh) token刷新方法、装置、电子设备及可读存储介质
WO2022033355A1 (fr) Procédé de traitement de courrier et dispositif électronique
WO2022062902A1 (fr) Procédé de transfert de fichier et dispositif électronique
WO2020216144A1 (fr) Procédé d'ajout de contact mail, et dispositif électronique
WO2023221917A1 (fr) Procédé de protection de compte, système de communication et dispositif électronique
CN115017498A (zh) 小应用程序的操作方法和电子设备
CN112286596A (zh) 消息显示方法及电子设备
WO2023179682A1 (fr) Procédé de collaboration de dispositif
WO2024061326A1 (fr) Procédé de protection de données, et dispositif électronique

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23806869

Country of ref document: EP

Kind code of ref document: A1